Technical Requirements Access to AWS CLI and the AWS Management Console with an active account are both required for this chapter. A basic understanding of network terms will also help as you work through this chapter. If you need help understanding networking fundamentals and basic terms such as CIDR, route, and access control list, refresh […]
First, make sure you have an EC2 instance profile that can be used for your Beanstalk environment. If you’re wondering what that is or how to create an EC2 instance profile, please refer to Chapter 5, Determining Security Requirements and Controls. The sample application simply displays Hello World on a web page, so you do not […]
Summary We’ve started our learning journey and begun with concepts around data modelling and design. We’ve covered sharing and security, delving into the various mechanisms available in Salesforce to control access to data. We’ve paid particular attention to how the OWDs and role hierarchy can have a profound impact on the data that your users […]
OSPF From the supported IGP protocols, the one that is covered is the Open Shortest Path First (OSPF). It is an IETF link-state routing protocol, which distributes information within a single autonomous system(AS). OSPF has two versions: IPv4 OSPFv2 (version 2), which is described in RFC 2328, and IPv6 OSPFv3 (version 3), which is described […]
Amazon CloudFront This section covers the following objective of Domain 5 (Networking and Content Delivery) from the official AWS Certified SysOps Administrator – Associate (SOA-C02) exam guide: 5.2 Configure domains, DNS services, and content delivery CramSaver If you can correctly answer these questions before going through this section, save time by skimming the Exam Alerts […]
Tracing Eligibility How does the JVM know when an object is eligible for garbage collection? The JVM waits patiently and monitors each object until it determines that the code no longer needs that memory. An object will remain on the heap until it is no longer reachable. An object is no longer reachable when one […]
Bringing it all together with data modeling We’ve covered a lot in this chapter, but now it is time to put the theory into practice and produce something tangible in the form of a data model. Now we know the OWDs we can set, the relationships between objects we can influence, and the owners of […]
7.1 Triggers and Their Execution Context Apex triggers are a powerful feature in Salesforce that allow you to execute custom logic before or after records are inserted, updated, or deleted in the database. They are associated with SObjects, which can be either standard objects such as Account, Contact, Opportunity, etc. or custom objects created to […]
Overview of the TCP/IP Networking Model The TCP/IP model both defines and references a large collection of protocols that allow computers to communicate. To define a protocol, TCP/IP uses documents called Requests For Comments (RFC). (You can find these RFCs using any online search engine.) Each layer broadly defines a set of functions that helps […]
Sales Forecasting Model with Amazon Forecast Let’s dive into a hands-on example of using Amazon Forecast to build a sales forecasting model. In this example, you’ll predict future sales based on historical data. Set up your dataset: Prepare a dataset containing historical sales data, ensuring it includes relevant timestamps and corresponding sales figures. Create a […]